Summary: Security is always a concern when working with data connections. When using tools like Anaplan Connect, Informatica Cloud, or various ETL or iPaaS connectors, there needs to be an authentication protocol that lets the system know the data is coming from a verified and trusted source. This lesson reviews different authentication methods, choosing the best method in different situations, and locating more resources and training on different authentication methods.
Audience: Model Builders, Data Integration Specialists, Solution Architects
Lesson Duration: 4 minutes
Lesson Location: This micro-lesson is also included in the Data Integration course in the Learning Center.
Start the Micro-lesson:
https://anaplanenablement.s3.amazonaws.com/Academy/Platform/SA/SA_01_NMX/L05_NMX/WEB/story.html
日本語版マイクロレッスンを開始する:
https://anaplanenablement.s3.us-east-1.amazonaws.com/Academy/Platform/Japanese/SA_JP/SA_01JA/NMX/SA01_L5_JA_NMX/story.html
For training purposes only. Not for use with, distribution or quotation to the general public. © 202 Anaplan, Inc. All rights reserved. Proprietary and Confidential. Read Full Legal Disclaimer